Search

Arjun Natarajan Phones & Addresses

  • Plainview, NY
  • Westbury, NY
  • Weston, FL
  • Jericho, NY
  • Fresh Meadows, NY
  • Hilton Head Island, SC
  • 18902 64Th Ave APT 3L, Fresh Meadows, NY 11365

Work

Company: Serialtek llc Nov 2010 Address: San Jose Position: Logic design engineer

Education

Degree: MS School / High School: Syracuse University 2008 to 2010 Specialities: Computer Engineering

Skills

ASIC • FPGA

Ranks

Certificate: Diploma in Advanced Digital Logic Design Date: April 2008

Interests

I have been a percussionist for over 20 ...

Industries

Computer Hardware

Resumes

Resumes

Arjun Natarajan Photo 1

Logic Design Engineer At Serialtek Llc

View page
Position:
Logic Design Engineer at SerialTek LLC
Location:
San Jose, California
Industry:
Computer Hardware
Work:
SerialTek LLC - San Jose since Nov 2010
Logic Design Engineer

VEDA IIT - Hyderabad Area, India Nov 2007 - May 2008
Hardware Trainee
Education:
Syracuse University 2008 - 2010
MS, Computer Engineering
Anna University 2003 - 2007
B.E, Electrical and Electronics
Skills:
ASIC
FPGA
Interests:
I have been a percussionist for over 20 years which serves as an excellent deviation from stress and work pressure I am an active sports person, I lead my team in the Bay Area Cricket Alliance league and also play for the Northern California Cricket Association
Certifications:
Diploma in Advanced Digital Logic Design

Business Records

Name / Title
Company / Classification
Phones & Addresses
Arjun Natarajan
Chief Executive Officer
TORRY HARRIS BUSINESS SOLUTIONS INC
Application Development · Computer Related Services
536 Fayette St, Perth Amboy, NJ 08861
(732) 442-0049

Publications

Us Patents

Method For Annotating A Process

View page
US Patent:
20090183102, Jul 16, 2009
Filed:
Jan 16, 2008
Appl. No.:
12/015020
Inventors:
Milton H. Hernandez - Tenafly NJ, US
Hani T. Jamjoom - White Plains NY, US
Arjun Natarajan - Old Tappan NJ, US
Thirumal R. Nellutla - Schaumburg IL, US
Sreeram Ramakrishnan - Yorktown Heights NY, US
Debanjan Saha - Mohegan Lake NY, US
Ramendra K. Sahoo - Mohegan Lake NY, US
Anees A. Shaikh - Yorktown Heights NY, US
Mithkal M. Smadi - Round Rock TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 3/048
US Classification:
715771
Abstract:
Techniques for annotating a process are provided. The techniques include identifying one or more annotation areas, obtaining one or more items of service process information, identifying one or more annotation attributes, and using the one or more annotation areas, one or more items of service process information and one or more annotation attributes to annotate a process. Techniques are also provided for creating an interactive mechanism.

Defending Against Adversarial Queries In A Data Governance System

View page
US Patent:
20220309155, Sep 29, 2022
Filed:
Mar 24, 2021
Appl. No.:
17/210838
Inventors:
- Armonk NY, US
Ashish KUNDU - Elmsford NY, US
Arjun NATARAJAN - Old Tappan NJ, US
Roger C. RAPHAEL - San Jose CA, US
Scott SCHUMACHER - Porter Ranch CA, US
International Classification:
G06F 21/55
G06N 3/04
G06N 3/08
G06F 16/901
Abstract:
An apparatus and related method defend against adversarial queries. A policy enforcement hypergraph is constructed to express a set of security policies. Then, the hypergraph is repeatedly traversed to determine whether a user behavior is changing over time. The user behavior is measured by reference to a vertex or an edge in the hypergraph. If it is determined that the user behavior has changed over time an enforcement action is taken based on a security policy.

Defending Against Adversarial Queries In A Data Governance System

View page
US Patent:
20220309179, Sep 29, 2022
Filed:
Mar 24, 2021
Appl. No.:
17/210866
Inventors:
- Armonk NY, US
Ashish KUNDU - Elmsford NY, US
Arjun NATARAJAN - Old Tappan NJ, US
International Classification:
G06F 21/62
G06F 21/31
G06F 21/60
G06K 9/62
G06N 3/08
Abstract:
A computer implemented method and related apparatus defend a system against adversarial queries. An enforcement graph is provided and used to enforce data policies for a system. A generative adversarial model (GAN) is used for querying the enforcement graph to detect a potential adversarial query-based attack against the enforcement graph A policy is provided to protect the enforcement graph against the potential adversarial attack.

Training A Neural Network To Create An Embedding For An Unlabeled Vertex In A Hypergraph

View page
US Patent:
20210256368, Aug 19, 2021
Filed:
Feb 16, 2020
Appl. No.:
16/792277
Inventors:
- Armonk NY, US
ARJUN NATARAJAN - OLD TAPPAN NJ, US
International Classification:
G06N 3/08
G06N 3/04
Abstract:
A method creates an embedding for an unlabeled vertex in a hypergraph. The method includes receiving a hypergraph of hyperedges, where each of the hyperedges includes one or more vertices, and at least one of the hyperedges includes an unlabeled vertex; generating a hypergraph of vertices from the hypergraph of hyperedges, where each of the vertices in the hypergraph of vertices includes one or more of the one or more hyperedges from the hypergraph of hyperedges; performing a first type of random walk through the hypergraph of hyperedges; performing a second type of random walk through the hypergraph of vertices; generating a set of vertex embeddings from the first type of random walk and a set of hyperedge embeddings from the second type of random walk; and using results of the first and second random walks to train a neural network to create an embedding for the unlabeled vertex.

Serving Data Assets Based On Security Policies By Applying Space-Time Optimized Inline Data Transformations

View page
US Patent:
20210081550, Mar 18, 2021
Filed:
Sep 17, 2019
Appl. No.:
16/573326
Inventors:
- Armonk NY, US
Hani Talal Jamjoom - Cos Cob CT, US
Rajesh M. Desai - San Jose CA, US
Iun Veng Leong - Union City CA, US
Uttama Shakya - San Jose CA, US
Arjun Natarajan - Old Tappan NJ, US
International Classification:
G06F 21/60
G06F 21/62
Abstract:
Serving data assets based on security policies is provided. A request to access an asset received from a user having a particular context is evaluated based on a set of asset access enforcement policies. An asset access policy enforcement decision is generated based on evaluating the request. It is determined whether the asset access policy enforcement decision is to transform particular data of the asset prior to allowing access. In response to determining that the asset access policy enforcement decision is to transform the particular data of the asset prior to allowing access, a transformation specification that includes an ordered subset of unit transformations for transforming the particular data of the asset is generated based on the particular context of the user and the set of asset access enforcement policies. A transformed asset is generated by applying the transformation specification to the asset transforming the particular data of the asset.

Deep Learning-Based Identity Fraud Detection

View page
US Patent:
20200364366, Nov 19, 2020
Filed:
May 15, 2019
Appl. No.:
16/413138
Inventors:
- Armonk NY, US
ARJUN NATARAJAN - OLD TAPPAN NJ, US
KAPIL KUMAR SINGH - CARY NC, US
JOSHUA F. PAYNE - SAN ANTONIO TX, US
International Classification:
G06F 21/62
G06N 3/04
G06Q 50/26
Abstract:
A method provides a security action based on identity profile scores. One or more processors represent an identity profile as a knowledge graph. The processor(s) associate a set of changes of the identity profile across a plurality of identity networks with a fraud score. The processor(s) then implement a security action based on the fraud score.

Deep Learning-Based Similarity Evaluation In Decentralized Identity Graphs

View page
US Patent:
20200358796, Nov 12, 2020
Filed:
May 10, 2019
Appl. No.:
16/409212
Inventors:
- Armonk NY, US
ARJUN NATARAJAN - OLD TAPPAN NJ, US
KAPIL KUMAR SINGH - CARY NC, US
JOSHUA F. PAYNE - SAN ANTONIO TX, US
International Classification:
H04L 29/06
G06F 16/901
G06N 3/08
Abstract:
A deep-learning based method evaluates similarities of entities in decentralized identity graphs. One or more processors represent a first identity profile as a first identity graph and a second identity profile as a second identity graph. The processor(s) compare the first identity graph to the second identity graph, which are decentralized identity graphs from different identity networks, in order to determine a similarity score between the first identity profile and the second identity profile. The processor(s) then implement a security action based on the similarity score.

Supporting Software Application Developers To Iteratively Refine Requirements For Web Application Programing Interfaces

View page
US Patent:
20160239269, Aug 18, 2016
Filed:
Feb 16, 2015
Appl. No.:
14/623156
Inventors:
- Armonk NY, US
Hani T. Jamjoom - Cos Cob CT, US
Jim A. Laredo - Katonah NY, US
Arjun Natarajan - Old Tappan NJ, US
Shriram Rajagopalan - White Plains NY, US
Daniel J. Williams - Ithaca NY, US
John E. Wittern - New York NY, US
International Classification:
G06F 9/44
G06F 17/30
H04L 29/06
Abstract:
Providing Web API recommendations for a context of an application is provided. A ranked list of recommended Web APIs and a set of Web API recommendations regarding the context of the application is sent to a client device via a network. In response to determining that a selection of a set of Web APIs in the ranked list of recommended Web APIs was received, the selected set of Web APIs is added to the context of the application to generate a new context of the application. A display of a relationship among the set of added Web APIs to the new context of the application is sent to the client device via the network.
Arjun Natarajan from Plainview, NY, age ~49 Get Report